First published: Mon Jun 19 2023(Updated: )
Stack-based buffer overflow vulnerability exists in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0. Opening a specially crafted SIM2 file may lead to information disclosure and/or arbitrary code execution. This vulnerability is different from CVE-2023-32273 and CVE-2023-32201.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Fujielectric Tellus | =4.0.15.0 | |
Fujielectric Tellus Lite | =4.0.15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32538 is a stack-based buffer overflow vulnerability in TELLUS v4.0.15.0 and TELLUS Lite v4.0.15.0 that allows for information disclosure and/or arbitrary code execution when opening a specially crafted SIM2 file.
CVE-2023-32538 affects Fujielectric Tellus v4.0.15.0 and Tellus Lite v4.0.15.0, allowing an attacker to potentially disclose sensitive information or execute arbitrary code by exploiting the stack-based buffer overflow vulnerability.
CVE-2023-32538 has a severity rating of 7.8 (high).
To fix the vulnerability in Fujielectric Tellus and Tellus Lite, it is recommended to update to a version that is not affected by CVE-2023-32538.
More information about CVE-2023-32538 can be found at the following references: [https://jvn.jp/en/vu/JVNVU98818508/](https://jvn.jp/en/vu/JVNVU98818508/) and [https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php](https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php).